Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
228370e47d35ae67597aae7b766f57fc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
228370e47d35ae67597aae7b766f57fc.exe
Resource
win10v2004-20231215-en
General
-
Target
228370e47d35ae67597aae7b766f57fc.exe
-
Size
344KB
-
MD5
228370e47d35ae67597aae7b766f57fc
-
SHA1
98405dcf9a1f0007552415226a768ef082c9009b
-
SHA256
0d960148ad80449008bdfd61966f1e08567ef5650357679f20defb9b981469c8
-
SHA512
a71f0a5e0f80de6f6e1df6778f828818095ae96e9a85edb63dcdf24cf708cf71e78e7eeab1344d2d73b865e336e1d2d4e366e316bd9471cf8886138d8f9a7e32
-
SSDEEP
6144:GgJ/jEN+PBQSsZQw9o1yhx6GeUIKMRSgsWWnD6/eTwSzHDd:U+PBSZ2ytWYz4SbD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000BB725B4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000BB725B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2188 043A6A5B00014973000BB725B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 043A6A5B00014973000BB725B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2368 228370e47d35ae67597aae7b766f57fc.exe 2368 228370e47d35ae67597aae7b766f57fc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000BB725B4EB2331.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\open\command 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\runas\command 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\open 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\start 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\ = "043A6" 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\ = "Application" 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\%s\ = "043A6" 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\Content Type = "application/x-msdownload" 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\DefaultIcon\ = "%1" 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\open\command\ = "\"C:\\ProgramData\\043A6A5B00014973000BB725B4EB2331\\043A6A5B00014973000BB725B4EB2331.exe\" -s \"%1\" %*" 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\%s 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\start\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\runas\command\ = "\"%1\" %*" 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\open\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\start\command\ = "\"%1\" %*" 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\runas 043A6A5B00014973000BB725B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\runas\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\DefaultIcon 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\043A6\shell\start\command 043A6A5B00014973000BB725B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 228370e47d35ae67597aae7b766f57fc.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2188 043A6A5B00014973000BB725B4EB2331.exe 2188 043A6A5B00014973000BB725B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2188 2368 228370e47d35ae67597aae7b766f57fc.exe 28 PID 2368 wrote to memory of 2188 2368 228370e47d35ae67597aae7b766f57fc.exe 28 PID 2368 wrote to memory of 2188 2368 228370e47d35ae67597aae7b766f57fc.exe 28 PID 2368 wrote to memory of 2188 2368 228370e47d35ae67597aae7b766f57fc.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000BB725B4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\228370e47d35ae67597aae7b766f57fc.exe"C:\Users\Admin\AppData\Local\Temp\228370e47d35ae67597aae7b766f57fc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\ProgramData\043A6A5B00014973000BB725B4EB2331\043A6A5B00014973000BB725B4EB2331.exe"C:\ProgramData\043A6A5B00014973000BB725B4EB2331\043A6A5B00014973000BB725B4EB2331.exe" -d "C:\Users\Admin\AppData\Local\Temp\228370e47d35ae67597aae7b766f57fc.exe"2⤵
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328B
MD513ee76b4d487e9dedaed8e5f0ade370e
SHA1539f142107574b854840ae11911ef592e6efc648
SHA256d2cce364412882bdd525c616635943448531ed3acfd59bbf645ad0cc915eaa87
SHA512e98bcbca6adf7e2c0fc98f1432c3f5070ed97feda682adbcb5a35686e1ed810addeccbffa5e03689b7eabadec6add5f1b1cdf96f9274e3e019e2e0ef867a4c7e
-
Filesize
344KB
MD5228370e47d35ae67597aae7b766f57fc
SHA198405dcf9a1f0007552415226a768ef082c9009b
SHA2560d960148ad80449008bdfd61966f1e08567ef5650357679f20defb9b981469c8
SHA512a71f0a5e0f80de6f6e1df6778f828818095ae96e9a85edb63dcdf24cf708cf71e78e7eeab1344d2d73b865e336e1d2d4e366e316bd9471cf8886138d8f9a7e32